Security Sessions: Where is VC security funding going?

Email not displaying correctly? View it in your browser.

CSO

CSO After Dark

Mar 22, 2017
Featured Image

Hackers threaten to wipe millions of Apple devices, demand ransom

A group of hackers is threatening to wipe millions of iOS devices in two weeks if Apple doesn't pay them US$150,000. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Security Sessions: Where is VC security funding going?
63% off Anker Quick Charge 3.0 39W Dual USB Car Charger - Deal Alert
US lawmakers question police use of facial recognition tech
5 reasons why China will rule tech, 2017 edition
These 10 people may be your greatest inside security risks
What it takes to become an IT security engineer
Critical infrastructure: Off the web, out of danger?

Benchmark Tool: Bitsight Technologies

BitSight Interactive Benchmark

Where is your company on the maturity curve when it comes to building an effective Vendor Risk Management (VRM) program? Take this quick assessment to identify strengths, weaknesses, and opportunities within your current VRM strategy. Read More

Thumbnail Image
Video

Security Sessions: Where is VC security funding going?

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild sits down with Jeff Fagnan from Accomplice, a venture capital and private equity firm in Cambridge, Mass. The two discuss the current state of VC funding in security companies and where the money is going (and not going), and why CSOs should "follow the money." Watch Now

Thumbnail Image
DealPost

63% off Anker Quick Charge 3.0 39W Dual USB Car Charger - Deal Alert

3 cutting-edge technologies combine to deliver the fastest possible charge to any device. Charge compatible devices up to 80% in just 35 minutes with Quick Charge 3.0. Patented PowerIQ and VoltageBoost deliver high-speed charging to non-Quick Charge devices. Read More

Thumbnail Image

US lawmakers question police use of facial recognition tech

U.S. lawmakers plan to introduce legislation to limit the FBI's and other law enforcement use of facial recognition technology after concerns about the mass collection of photographs in police databases. Read More

Thumbnail Image

5 reasons why China will rule tech, 2017 edition

In 2010, Computerworld looked at five reasons why China will rule in technology. In 2017, the case for China has grown stronger. Read More

Thumbnail Image

These 10 people may be your greatest inside security risks

Last year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user access. Read More

Thumbnail Image
INSIDER

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set now. Read More

Thumbnail Image

Critical infrastructure: Off the web, out of danger?

For more than a decade there have been warnings that US critical infrastructure is vulnerable to a cyber “Pearl Harbor” attack. Those overseeing the grid say that is close to impossible, since control systems are not connected to the internet. But other experts say the level of risk, while low, is still unacceptable. Read More

White Paper: Level 3

Connecting Financial Services' Hybrid IT Infrastructure

Connecting Financial Services' Hybrid IT Infrastructure Read More

Top 5 Stories

1. Inside the Russian hack of Yahoo: How they did it
2. 6 of the most effective social engineering techniques
3. How to write an information security policy
4. Cisco to patch 300 devices against flaw found in CIA archives
5. Experts divided on value of Cyber National Guard

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO After Dark as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.